Networking Concepts

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11
At a glance
Powered by AI
Some of the key takeaways from the document are that computer networks connect computers together to share resources like printers and storage. They allow for communication and data transfer between different devices. The internet is an outcome of computer networking.

The main components of a computer network are nodes or devices like computers that are connected, a transmission medium like cables or wireless signals that connect the nodes, protocols or rules that govern how data is communicated, and messages or the actual data being transferred between nodes.

Some advantages of networking include efficient use of storage by centralizing it, easier backups and preservation of information, reduced hardware costs by sharing devices, quicker document delivery between computers, and redundancy of data by storing it in multiple locations.

NETWORKING CONCEPTS

ESSON

1
CHAPTER
LEARNING IN THIS Networkingdevices
and its Components NetworkingTerminology
Computer Network
Advantages of Networking Protocols
NetworkingMedia
Types of Networks

such as:
different types of networks,
we come across
In our daily life,

etc.
o Network of roads, railway lines, canals,
Communication network of telephone system that

enables us to talk to anyone, anywhere, anytime.

Network of Banks/ATMs (Automated


Teller Machines).
Bramalo broadcasts programs
Radio/Television network that
across the globe. Network of Network
Mobile Phones of Roads
the
malls, schools, hospitals, etc., all
over
Network of

country.
etc. It is unbelievable to
think life without
without networking phone, No No radio, No television,
Imagine life
. .

have also become an


networks that connect millions of computers together
these amenities. Similarly, computer of a room. The
have extended the power of a computer beyond the expanse
integral part of our life these days. They networks in detail.
networking only. Let us understand the concept of computer
Internet is an outcome of cyber
COMPONENTS
COMPUTER NETWORK AND ITS
and other
peripheral devices that are linked together
defined as a group of computers
A Computer Network can be hasd
hardware resources. For example, if one of the computers in a network
for the purpose of sharing data and
in that network can access the printer and use it to print
the documel
printer attached to it, then all the computers ched

A and B in a network can give the print command to


the printer attac
as shown in Figure 1.1, where Computer

with Computer C.

Computer A Hub Computer C

Computer B Printer
Figure 1.1:AComputer Network

Learnkng witn Kips


Computers
"

ne computers in a network can communicate with each other as well as work independently. Each computer the
network is called a Node. One of these nodes acts as a Sender that transmits the information to other no0es "

les
network known as Receivers. These computers are linked with each otherthrough some medium, suc a a

telephone lines, radio waves, or infrared light beams.


Let us understand a computer network as a data communication system with the help of Frgure
.6
Message

Medium

Sender Receiver
Figure 1.2: Computer Network as a Data Communication System

It consists of the following parts:


1. Message-Itisthe information to be communicated. It can contain text, pictures, audio, video, etc
2. Sender-Sender is a device, ie., a computer,workstation, mobile phone, or tablet that sends the data message
through web browser.
3. Receiver Receiver is a device that receives the data messages. It can also be a computer, workstation, tablet, or
mobile phone.
4 Transmission medium It is the physical path through which the message travels from the sender to the
receiver. Twisted pair cable, coaxial cable, iber-optic cable, and radio waves are some common examples of a
transmission medium.
5. Protocol-A protocol specifies a set ofrules that governs the data communication. Withouta protocol, the data
cannot be exchanged between two communicating devices.

ADVANTAGES OF NETWORKING

Networking in computers brings efficiency, economy, and effectiveness in an organisation.

EFFICIENT USE OF STORAGE MEDIA

It ic more economical to store an application soTtware on a network drive than to store


a copy of the
each user's storage device. It is better to have one big hard disk in the server
application on
thanto have small hard disks in
different
computers.
PRESERVING INFORMATION

t difficult to maintain regular backups on a number of


is
stand-alone computers. When
central location, you have one place to look for the lost
information. you keep backups on a

REDUCTION IN HARDWARE COSTS


In a network, the hardware devices that are not used often
like modems, printers, scanners,
shared.This reduces the total expenditure on
hardware. CD-writers, etc., can be
EFFICIENCcY
in a network, the deletion, modification, or
upgradation of the software/data is
to be done at a single point only. This
the working system.
and effectiveness into
brings more efficiency
REDUNDANCY

the soft copy of a file over the net.

A network reduces
the need copies of all documents. Sharing
for hard twork
or any other
information.
reduces the need to share hard copies of reports
eliminates or greatly

QUICKEST DOCUMENT DELIVERY

to instantly deliver soft copies from one computer to the other computer.
puters
Networking provides a facility
throughout the world.

NETWORKING MEDIAA
Data can be transmitted from one location to another by using wires or without the use of wires.

wIRED NETWORKING TECHNOLOGY

Ethernet Cables

An Ethernet cable is one of the most popular form of network cable used in wired networks.
This cable resembles a phone cable, but is larger than the phone cable and has eight wires.
Ethernet cables connect various devices such as PCs, routers, and switches within a local area
network. The advantage of these cables is that they have less power consumption, but the
drawback with these cables is that the computer requires an Ethernet adapter card on the
motherboard to connect the Ethernet cable. These cables also have their limitations, both in
the distance that they can stretch without losing signal quality and their durability. Figure 1.3: Ethernet
Cable
There are mainly two types of Ethernet cable:

Crossover cable: It is basically designed for connecting two computers without a hub or router.

Straight-through cable: This type of cable has got both its ends identical to each other. It is used to connecta
computer to a router or a switch.

Coaxial Cables
A Coaxial cable is used in the transmission of video, communication signals, and audio. It is

mainly used by the cable television industry to connect TVs to a cable TV service. However
this cable can also be used in networks and has
high bandwidth and greater transmissioln
capacity. A Coaxial cable consists of central copper wire surrounded by insulation and thend
Figure 1.4: Coaxial Cable shield of braided wire.

It is relatively inexpensive and transmit data at


can
higher rates. It also
provides better protection agaainst
electromagnetic disturbances. The only disadvantage associated with Coaxial cable is its
and

maintenance costs. high installatio


The two main types of Coaxial cable
are:
Baseband Coaxial cable: It
supports quick transmission of a single signal at a time. It is
mainly used for LANS.
Broadband Coaxial cable: It transmits
multiple signals at the same time and is used for
longer distances.
Optical Fiber cable
cabie
A Fiber optic
ata very high speed.
6 d t h a s a
larger capacity totransferdata
consists of a central glass core containing a bundle of glass threads, surrounded Dy SEv
layers of protective materials. The glass threads are capable of transmitting data converteu
into light signals at extremely high speed.
A Fiber optic cable is highly resistant to signal interference and provides better dde
transmission by providing high bandwidth. Presently, a Fiber optic cable is a populd
Figure 1.5 Optical
technology for local area networks. But in the future, almost all communications will employ Fiber Cable

fiber optics. However, it is fragile and the maintenance cost is high.

wIRELESS NETWORKINGTECHNOLOGY

Bluetooth
Bluetooth is a communication technology that uses low power radio waves to connect

electronic devices wirelessly. It allows users to talk and share information like voice, music,
and
and videos. It establishes
other network devices. lt is
short-range

transmission range of upto 240 meters


mainly
communication between

used for personal area


phones,

depending on the bluetooth version in


computers,
networks with a maximum

use. This
()
icon
technology eliminates the use of cables and adapters. The presence of Bluetooth
indicates that the device is enabled with Bluetooth.

Infrared Technologyy
Infrared technology is a short range communication technology that covers approximately

of distance. It is used to exchange information between computers, cellular


5 meters

telephones,and faxes by emitting infrared waves through infrared LEDs. Infrared


communication can take place only between two devices at a time. Infrared network signals
cannot penetrate walls or other obstructions and work only in a direct line of sight. These
waves or signals are focused into a narrow beam through a plastic lens, which is further
converted into electronic signals by the receiver. Remote control is the most common

example of infrared communication.


Wi-Fi
Wi-Fi stands for Wireless Fidelity. It creates a Wireless Local Area Network that uses radio
waves to send the information. A secure, reliable, and fast wireless connection is established
between the electronic devices and the Internet by using this technology. The devices require
a wireless adapter connected to them to capture the Wi-Fi signals.
WiFD
Wi-Fi offers the following advantages: ZONE
Wi-Fi has replaced the wired medium completely and can be used to connect
to the Internet
time.
anywhere, at any
It is relatively inexpensive and can also be accessed at
places where cables cannot be installed.
One can connect multiple devices through Wi-Fi.
However, there are some limitations too.

Ithas high powerconsumption.


it is slower than
the wired medium.
interference.
or slows down when there is noise
The transmission breaks

TYPESTYPES OF NETWORKS various types of computer


networks uSed
geographical
on the area covered by a network, there are
Depending
worldwide, which are as follows:

PERSONALAREA NETWORK (PAN)


PAN is a computer network that covers a small area of about Home
tnterconnecting
structure
10 meters (about 30 feet). It is used for communication
net UMIS, WLAN ad hoc. efc

among devices, such as laptops, mobile phones, PDA, or N Corporate cluster

smartphones. Personal area networks can eitherbe wired or


Smart building
wireless. You can use these networks to transfer files
PAN
including e-mails, calendar appointments, digital photos, Private PAN
and music.
Figure 1.6: Personal Area Network
LOCALAREA NETWORK (LAN)
In LAN, two or more computers and peripheral devices are connected
within a small area, such as a room or an office building. In Local Area
LAN Network, computer terminals are physically connected with wires. The
data transmission speed is slow as compared to WAN. Since LAN is
operated in a small area, it can be controlled and administered by a single
person or an organisation.

Figure 1.7: Local Area Network


Campus AreaBuiliding
Network2
(CAN)
CLUSTER AREA NETwORK (CAN)
Building1 Burnsrnj

CAN, also known as Campus Area Network, is a network


comprising a series of small
LANs Over small
a
geographical area, such as a college campus. This network covers an
area smaller than MAN.
Building4

Figure 1.8: Cluster


METROPOLITAN AREA NETWORK (MAN) Area Network

MAN nutacturin MAN is a larger network than LAN. It is spread across a


hundred kilometers ina city, it is called city. Since it covers an area of a few
metropolitan. The most common
type network is the cable television, branches
of a local bank in a example of MAN
hppingkeceivin city, etc.
Figure 1.9: Metropolitan
Area Network

WIDEAREA NETWORK (WAN)


This kind of network connects
two or more
facilities, Ilike telecommunication or computers located at distant places.
satellite signals. The most They are linked by communicatio
common
example of WAN type network is the
Learning 10
AN)
telecom system. The usage of WAN is limited to very large
organisations and government agencies. The main characteristic of
WAN is that it requires a public telecommunication media to transfer
data. The best examples of WAN are:
WAA

Internet and Intranet in a large multinational company.


ATM facility. utone
System ROUeS

National and Multinational bank customer services.


Example
Figure 1.10: Wide Area Network
NETWORKING DEVICES in
other electronic devices togetner
Networking devices are the hardware devices used to connect computers or or
like or fax machines. These
devices work at different segments
order to share files or resources printers
computer network, performing different tasks.
MODEM
the available Internet connection
A modem enables you to connect your computer to
into analog
over the existing telephone lines. It
converts the digital signals of a computer
lines. At the destination, the receiving
signals to enable their transmission via phone data can be
modem further converts the analog signal
into digital signals so that the
Internal
are available in two categories:
understood at the receiving end. Modems
Internal modem comes as a separate part
that is Figure 1.11: Modemn
modem and External modem. An
the
Interconnect) slots available on
installed on the PCI (Peripheral Component
modem is connected externally to computer.
a
motherboard, and an external
HUB
networking device that is used to
connect multiple computers and computing
A hub is a

devices directly to the network by using


cables. Each connection is called a port. The
cable. When the hub receives data at one of its
connections are established usingafiber optic
data to the other ports in the network. Typically, a hub sends all the
ports, it distributes the
connected ports.
Figure 1.12: Hub data it receives to all the

sWITCH
Switches contain many ports to connect
different network segments. They are similar
when a network contains a large number of
to hubs, but offer greater performance.
devices, switches are needed instead of hubs to maintain the speed of the
communication between devices. Unlike, hub, a switch is aware of the addresses
assigned to each of its ports and sends the incoming data it receives only to the

intended port. Figure1.13: Switch


REPEATER

A Repeater is a communication device, used to


signals, cleans them, and retransmits them.
regenerate a signal.it receives
electronic
14 Signals tend to distort when
transmitted over
Repeater long distances. Repeaters dre needed so
that the signals can travel longer distances with the
same strength or even at a higher power.

ROUTER

A Router is a communication device that is used to connect two different networks, Such
as two LANs, or a LAN and a WAN. It plays a vital role in controlling the traffic and keeping
the network efficient. It chooses the best route for the data packets to be transmitted at
the receiver's end. Figure 1.15: Router

GATEWAY
A Gateway is a network point that acts to another network using different
as an entrance
protocols thereby giving us freedom and convenience to enjoy online activities. It allows us to
carry out various online activities, such as sending e-mail, browsing through web pages,
Duying things online, and more. It is a shared connection between a local area network and a
Figure 1.16: Gateway larger system, i.e., WAN. It basically works as the messenger agent that takes data from one
ystem, interprets it, and transfers it to another system. Itis also called packet converter.

BRIDGE
A Bridge is a repeater with add-on functionality
of filtering content by
addresses of the reading the Bridge
and the destination. It is used to
source
interconnect two LANs
working on the same protocol and provide communication between them. It
also
prevents unnecessary traffic from entering the network and reduces
congestion.
Figure 1.17: Bridge
NETWORKING TERMINOLOGY
INTERNET
The Internet is a
global wide area network that connects computer systems across the
world. It provides a
information and communication facilities. It consists of variety of
interconnected networks which
standardized communication protocols. communicate via
INTRANET
Intranet refers to Internet
a computer network within an

used to share files and resources of the


organization, Intranet
organization securely.
The private information of an
organization cannot be
accessed by any outside DirectAccess
person as it is protected by a firewall. Clhent
DireetAccdss
For example, the Server or UAG

employees of an airlines are interlinked with Corporate resouroes


each other through the Intranet so
that they can access and
modify booking and flight data, but the same information
intemai taic
Intemet traffic
nternet servers
cannot be accessed by an outsider. Figure 1.18:
Internet &Intranet
BANDWIDTH
Bandwidth is the amount of data that can be transmitted in a fixed amount of
expressed in bits per second (bps) or bytes per second, time. The
bandwidth
Megabytes per second (Mbps).
or in
higher units, like usually is
Kilobytes per second (Kbps) and
Learning
Cemputers n Kips 12
INTERNET SERVICE PROVIDER (ISP)
These are the
organizations that provide Internet connection to users. The
facility is provided to the customers in exchange for a fee. Some common The tnternet

ISPs providing Internet service in India are BSNL, Airtel, Reliance, Sify, etc.
Modem
Modem
WEBSITE Telephone Line

Awebsite is a collection of related web pages containing images, videos, or


other digital media, A website is identified by a same domain name, which is
ISP Diagram
Figure 1.19: An
the address of the website. These pages are written in Hypertext Markup
Language (HTML) and can be accessed via the Internet. A website is hosted on a server on the worla w d c c

Each website is owned and managed by an individual, company, or organization.

WEB PORTAL
Web Device
Desktopp
or entrance.
In the context
Apps Conventionally, aportal m e a n s a gateway to a wide
as a gateway
can be defined
of the World Wide Web, a portal
search engines,
Web GIS
range of Internet services, such as e-mails,
but with a huge
Portal e-commerce, etc. A
web portal is also a website,
Portal breadth of offerings. However, unlike
a website, it
does not contain

web pages to the user to


Gis Ready-to-Use information on any topic, rather it suggests
most of the search engines
Content
Servers

find the desired information. Now-a-days,


to present information
from diverse
Server Online Content
and Services are acting as web portals

Portal
sources in a unified way like Yahoo, MSN, etc.
Figure 1.20: Web

WEB PAGE
stored on a web server. It is a digital page which may contain text, hyperlink,
Aweb page is written using HTMLand is
tables, etc. Each web page
is identified by a unique web address called Uniform Resource
videos, audios, images,
Locator(URL).
HOMEPAGE

the first page ofa website.


It contains the main information about a website along with links to the other parts of
It is

the website.

LINK
ln data communication, a link is a line or channel that connects two devices. Data is transmitted between the
this channel.
connected devices through

HYPERLINK
A hunerlink is an image, audio, video, graphics, or text that connects one web page to another web page, or to
another section within the same page.

HYPERTEXT

Hypertext is a text with a special feature ot linking to other documents or web


pages. It can be easily identified on a
web page as it appears ith an underine and is usually in blue colour.
HYPERMEDIA

It is a hypertext that includes text, graphics, sound, or video.

UNIFORM RESOURCE LOCATOR (URL)


The Uniform Resource Locatordenotes the unique address of a web page or a website. To open a web page, its URI
is entered in the Address Bar of a web browser.

An example ofa website URL is: http://www.wikipedia.com


IPADDRESs (NUMBER ADDRESSING
SYSTEM)
An IP address consists of a
unique set of numbers, which is provided to each
Task force). It is a 32 bit numeric address computer by IETF(Internet Engineering
containing a set of four numbers, which varies from0 to 255 and is
separated by periods. It can also be used to access the web
IP address is: 205.198.0.1
page instead of typing the Domain Name. An example of

DOMAIN NAMING SYSTEM

Domain Name is a
unique name
given to each website
resource or
connected to the Internet. Domain names
are easier to
than IP addresses since remember
name has
strong correlation with the
website. For example, the domain
name for Google search
google.co.in and for engine, is
Wikipedia, it is
wikipedia.org. The Domain es
com
Name gOV
System (DNS) is the system in which domain names are
eau

translated into internet protocol colorado


(IP) addresses. Since the Internet mtghouse paulallen unh
works only with IP addresses. It serves as a
directory for the web by
locating and
addressing devices in the worldwide network. A maria Kim
domain consists of two parts. One is the name
name roxy
of the domain
and other is the web
extension. The name of the domain Figure 1.21: Domain
comes
before the dot (,) Naming System
symbol and the extension comes after it. The web
extension tells the kind of
to.
organization and the country it belongs

PROTOCOLS
e live in a
world where millions of people across the globe speak
be able to
communicate worldwide, if there are no hundreds of different
machines process data. These 'standards' governing the
way we communicate
languages. We would never
standards are nothing but sets of rules and the way our
which are followed
Similarly, there are certain rules which by everyone.
determine how data should be
presented on the screen, and so on. These sets of transferred over
rules are called
Protocols. networks, compressed,
Likewise, there are many other
need of protocols is to protocols, each one governing the way a
standardize the processes and certain
about the most common ways of technology works.
Hence, the basic
protocols and their unique features.
communicating over computer network.
a
Let learn us

Learning
Computers with KIPS 14
TCP/IP FactFlle
TCP/IP was developed
TCP/IP (Transmission Control in 1978, and driven by
Protocol/lnternet Protocol) is a Robert Elliot Kahn and

suite of communication Vinton Gray Cerf.


protocols STEP
STEP2
The Packets travel from STEP3
he TCP protocol
used to connect various Dredks data
rouler to rouler over the
Internet according to the
The TCP protocol
reassembles the
mo packets packets into the To
From: IP protoco
computers on the Internet. It original whiole Ffon
router outer)
provides end-to-end data
Sender
(router
recipient
communication specifying how router
router router Let's Know More
data should be broken into pieces The actual protocols
called packets, transmitted, and Figure 1.22: Working of TCP/IP model
of the TCP/IP
are collectively called
routed from one network to
the Internet Protocol

another until they reach their destination. TCP/IP is a combination of two separate been
Suit, which has
protocols: designed by
the Internet Engineering

TCP or Transfer Control protocol is used for a reliable and foolproof data transmission Task Force (IETF).

Over the network. It is responsible for dividing the data into packets at the sender's side

and for assembling these packets at their correct destination.

IP or Internet Protocol provides a sequence number to each of these packets so that they

reach their destination in correct order. Also, it handles the addressing of each
might
Let's Know More
packet so that it is delivered to the correct destination. Hypertext Transfer
Protocol Secure (HTTPS)
HTTP
is the secure version of
determines how different forms of information HTTP, the protocol over
HTTP Hyper Text Transfer Protocol
or
which data is sent
other multimedia files) get transferred to your screen
(text, images, sound, video, and between your browser
also defines what actions web servers and browsers
over the Internet. This protocol and the website that your
commands. are connected to. Here all
should take in response to various
communications between
For example, when a user enters the URL for any web page in the address bar of the browser and the website
are encrypted
command to the server requesting it to open the specified web
browser, it sends an HTTP
page.

HTTP
Request Message
Fact File

HTTP
Response Message
HTTP Clients
HTTP over TCP/IP
(Web Browser) HTTP Server (Web Server)
Figure 1.23: Working of HTTP
FTP
The File Transter
ETP ar File TransferProtocol isstandard Internet Protocol.
a
It is one of the
Protocol (FTP) was
aciest Ways to exchange files between two or more simplest and originally designed by
computers on the Internet, using
Abhay Bhushan and
published in 1971
TP Client and FTP server download sortware/programs
software. FTP uses lnternet's TCP/IP protocols to to

nOu
Computer trom other sources. The source can be a web server or a remote host over the Internet.

You can use FTP either using a GUI based FTP Software or via MS.n
FTP CLIENT
FTP SERVER
prompt. Nowadays, Internet browsers inbuilt feature to
have an
make
file or content
Data connection is
initiated from the FTP requeststo other servers. To access any using FTP

Server side user needs to log in on to the FTP server by providing his/her credentis
ials
ONTERNET The FTP software allows the user to drag and drop the file between th
cONNECTION the
Control connection is
remote and local host. Some of the files are always available free for
initiated from the public use/download. Such files can easily be accessed using the
Cient side ne
anonymous FTP.
Figure 1.24:
Working of the FTP
SMTP Message Message

SMTP (Simple
Mail Transfer
Protocol) is the most common Sending o Mail Queue SMTP Server
protocol used for sending e-mails between two or more servers.
It is
generally used to send messages
from a mail client to a mail Internet
server. The
messages are then retrieved by thee-mail client.
Mail Queue
>POP3 Server Receiving PC
Message Messagge

Messages and
ma cally
are
Email server stored locally
one
Messages and mputer. Figure 1.25: Working of SMTP
mailboxes are
stored centraly OR
Once a along with POP
message is
so you can view
hem downloaded to
IMAP AND POP
n your IMAP Cnhecking your Checkin9 your your computer
t cannot be
emai with IMAP email with POP
o u n t oetais. viewed from
another
location.
IMAP (Internet Message Access
Protocol) the two most Protocol)
UCL Central Filestore
OR
Office and POP (Post
are

protocols for retrieving e-mails. popular


CL
Computer
Home
Computer
Intemet
ate
Internet standard
In
(R-mgmah) every single e-mail client today's world, almost
supports both these
totheir wide
acceptability. protocols due
Home
The utility of IMAP
internet Cafe or POP
Computer UCL WebMail
their usage in protocols varies
with respect 0
different environments.
e-mail application, it is When configuring
essential to specify a
protocol, i.e., SMTP and the
both, the sending
Figure 1.26: Working of IMAP and POP
IMAP receiving protocol, i.e., POP C

Learning Kins 1

You might also like